/system/bt/bta/mce/ |
H A D | bta_mce_act.c | 64 int found = 0; local 93 evt_data.mas[found].scn = pe.params[0]; 98 evt_data.mas[found].p_srv_name = (char *) p_attr->attr_value.v.array; 99 evt_data.mas[found].srv_name_len= SDP_DISC_ATTR_LEN(p_attr->attr_len_type); 104 evt_data.mas[found].instance_id = p_attr->attr_value.v.u8; 109 evt_data.mas[found].msg_type = p_attr->attr_value.v.u8; 111 found++; 112 } while (p_rec != NULL && found < BTA_MCE_MAX_MAS_INSTANCES); 114 evt_data.num_mas = found;
|
/system/core/base/ |
H A D | strings.cpp | 38 size_t found; local 40 found = s.find_first_of(delimiters, base); 41 result.push_back(s.substr(base, found - base)); 42 base = found + 1; 43 } while (found != s.npos);
|
/system/bt/btif/co/ |
H A D | bta_gatts_co.c | 71 BOOLEAN found = FALSE; local 80 found = TRUE; 85 if (!found)
|
/system/security/keystore/tests/ |
H A D | auth_token_table_test.cpp | 105 const hw_auth_token_t* found; local 107 ASSERT_EQ(AuthTokenTable::OK, table.FindAuthorization(make_set(1), KM_PURPOSE_SIGN, 0, &found)); 108 EXPECT_EQ(1U, found->user_id); 109 EXPECT_EQ(2U, found->authenticator_id); 111 ASSERT_EQ(AuthTokenTable::OK, table.FindAuthorization(make_set(2), KM_PURPOSE_SIGN, 0, &found)); 112 EXPECT_EQ(1U, found->user_id); 113 EXPECT_EQ(2U, found->authenticator_id); 115 ASSERT_EQ(AuthTokenTable::OK, table.FindAuthorization(make_set(3), KM_PURPOSE_SIGN, 0, &found)); 116 EXPECT_EQ(3U, found->user_id); 117 EXPECT_EQ(4U, found 134 const hw_auth_token_t* found; local 153 const hw_auth_token_t* found; local 225 const hw_auth_token_t* found; local 235 const hw_auth_token_t* found; local 252 const hw_auth_token_t* found; local 262 const hw_auth_token_t* found; local 272 const hw_auth_token_t* found; local 305 const hw_auth_token_t* found; local [all...] |
/system/update_engine/payload_generator/ |
H A D | cycle_breaker.cc | 158 bool found = false; // Was "f" in the original paper. local 183 found = true; 186 found = true; 193 if (found) { 208 return found;
|
/system/bt/stack/a2dp/ |
H A D | a2d_api.c | 59 BOOLEAN found = FALSE; local 67 /* loop through all records we found */ 70 /* get next record; if none found, we're done */ 109 found = TRUE; 120 (*a2d_cb.find.p_cback)(found, &a2d_svc); 242 ** returned for the first service record found on the
|
/system/extras/simpleperf/ |
H A D | cmd_report_test.cpp | 123 bool found = false; local 128 found = true; 132 return found; 136 bool found = false; local 141 found = true; 145 return found;
|
H A D | read_apk.cpp | 77 bool found = false; local 84 found = true; 89 if (!found) { 93 // We found something in the zip file at the right spot. Is it an ELF? 107 // Elf found: add EmbeddedElf to vector, update cache.
|
/system/security/keystore/ |
H A D | auth_token_table.h | 74 keymaster_operation_handle_t op_handle, const hw_auth_token_t** found); 88 const hw_auth_token_t** found) { 89 return FindAuthorization(AuthorizationSet(params, params_count), purpose, op_handle, found); 148 const hw_auth_token_t** found); 151 const AuthorizationSet& key_info, const hw_auth_token_t** found); 86 FindAuthorization(const keymaster_key_param_t* params, size_t params_count, keymaster_purpose_t purpose, keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) argument
|
H A D | auth_token_table.cpp | 88 const hw_auth_token_t** found) { 99 return FindAuthPerOpAuthorization(key_sids, auth_type, op_handle, found); 101 return FindTimedAuthorization(key_sids, auth_type, key_info, found); 106 keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) { 119 *found = matching_op->token(); 126 const hw_auth_token_t** found) { 142 *found = newest_match->token(); 168 auto found = find_if(entries_, [&](Entry& e) { return e.token()->challenge == op_handle; }); local 169 if (found == entries_.end()) 172 assert(!IsSupersededBySomeEntry(*found)); 85 FindAuthorization(const AuthorizationSet& key_info, keymaster_purpose_t purpose, keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) argument 104 FindAuthPerOpAuthorization( const std::vector<uint64_t>& sids, hw_authenticator_type_t auth_type, keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) argument 123 FindTimedAuthorization(const std::vector<uint64_t>& sids, hw_authenticator_type_t auth_type, const AuthorizationSet& key_info, const hw_auth_token_t** found) argument [all...] |
/system/vold/ |
H A D | MoveTask.cpp | 68 bool found = false; local 75 found = true; 78 return found ? OK : -1;
|
/system/bt/bta/pan/ |
H A D | bta_pan_act.c | 262 BOOLEAN found = FALSE; local 272 found = TRUE; 278 if (found == FALSE)
|
/system/bt/service/example/heart_rate/ |
H A D | heart_rate_server.cpp | 150 bool found = false; local 157 found = true; 172 if (found) {
|
/system/bt/stack/btm/ |
H A D | btm_dev.c | 68 BOOLEAN found = FALSE; local 118 found = TRUE; 122 if (found) 175 ** Returns TRUE if removed OK, FALSE if not found or ACL link is active 339 BTM_TRACE_DEBUG("btm_dev_support_switch return TRUE (feature found)");
|
H A D | btm_ble_adv_filter.c | 253 ** Returns pointer to the counter if found; NULL otherwise. 366 ** Returns pointer to the counter if found; NULL otherwise. 426 BOOLEAN found = FALSE; local 437 found = TRUE; 443 return found; 717 BTM_TRACE_ERROR("no matching filter counter found"); 1073 BTM_TRACE_ERROR("BD Address not found!");
|
/system/core/logd/ |
H A D | LogReader.cpp | 165 bool found() { return startTimeSet; } function in class:LogFindStart 173 if (!logFindStart.found()) {
|
H A D | LogBuffer.cpp | 316 { // start of scope for uid found iterator 317 LogBufferIteratorMap::iterator found = local 319 if ((found != mLastWorstUid[id].end()) 320 && (it == found->second)) { 321 mLastWorstUid[id].erase(found); 326 // start of scope for pid found iterator 327 LogBufferPidIteratorMap::iterator found = local 329 if ((found != mLastWorstPidOfSystem[id].end()) 330 && (it == found->second)) { 331 mLastWorstPidOfSystem[id].erase(found); 401 LogBufferElement *found = it->second; local 602 LogBufferIteratorMap::iterator found = mLastWorstUid[id].find(worst); local 611 LogBufferPidIteratorMap::iterator found local [all...] |
/system/bt/bta/gatt/ |
H A D | bta_gattc_utils.c | 227 APPL_TRACE_DEBUG("bta_gattc_clcb_alloc: found clcb[%d] available",i_clcb); 260 ** Description find or allocate CLCB if not found. 388 BOOLEAN found = FALSE; local 395 found = TRUE; 404 /* if not found, try to recycle one known device */ 405 if (!found && !p_recycle) 407 else if (!found && p_recycle) 671 APPL_TRACE_DEBUG("bta_gattc_conn_alloc: found conn_track[%d] available",i_conn); 700 APPL_TRACE_DEBUG("bta_gattc_conn_find: found conn_track[%d] matched",i_conn);
|
H A D | bta_gattc_act.c | 1628 BOOLEAN found = FALSE; local 1641 found = TRUE; 1645 if (found)
|
/system/bt/stack/gatt/ |
H A D | gatt_db.c | 1020 BOOLEAN found = FALSE; local 1023 return found; 1034 found = TRUE; 1040 found = TRUE; 1042 /* else attr not found */ 1043 if ( found) 1046 return found;
|
H A D | gatt_main.c | 225 ** Returns TRUE: if connection found and to be disconnected; otherwise 283 BOOLEAN found=FALSE; local 296 found = TRUE; 305 if (!found && is_add) 312 found = TRUE; 318 GATT_TRACE_DEBUG("gatt_update_app_hold_link_status found=%d[1-found] idx=%d gatt_if=%d is_add=%d", found, i, gatt_if, is_add);
|
/system/core/init/ |
H A D | action.cpp | 137 *err = "property trigger found without matching '='"; 146 *err = "multiple property triggers found for same property"; 200 bool found = name.empty(); local 208 found = true; 218 return found;
|
/system/core/adf/libadf/ |
H A D | adf.c | 795 bool found = false; local 798 found = adf_find_simple_post_overlay_engine(dev, formats, n_formats, 800 if (found) { 807 if (!found)
|
/system/extras/f2fs_utils/ |
H A D | f2fs_sparseblock.c | 308 SLOGE("Valid Checkpoint not found!!"); 490 unsigned int used, found, started = 0, i; local 505 found = 0; 509 found = 1; 515 if (!found) {
|
/system/extras/perfprofd/tests/ |
H A D | perfprofd_test.cc | 105 auto found = s.find_last_of("/"); local 106 test_dir = s.substr(0,found); 288 std::cerr << testpoint << ": expected result not found\n"; 476 W: line 10: line malformed (no '=' found)
|